cups 2.2.10-6+deb10u5 source package in Debian

Changelog

cups (2.2.10-6+deb10u5) buster; urgency=medium

  * Non-maintainer upload by the LTS Team.
  * CVE-2020-10001.patch
    An input validation issue might allow a malicious application
    to read restricted memory.

 -- Thorsten Alteholz <email address hidden>  Wed, 23 Feb 2022 22:03:02 +0100

Upload details

Uploaded by:
Debian Printing Group
Uploaded to:
Buster
Original maintainer:
Debian Printing Group
Architectures:
any all
Section:
net
Urgency:
Medium Urgency

See full publishing history Publishing

Series Pocket Published Component Section

Builds

Downloads

File Size SHA-256 Checksum
cups_2.2.10-6+deb10u5.dsc 3.4 KiB 4a5ec6f5a9ae50a5ccb1873a9464af05f07a6422ec5e7f8d4f31368a17518914
cups_2.2.10.orig.tar.gz 9.9 MiB 77c8b2b3bb7fe8b5fbfffc307f2c817b2d7ec67b657f261a1dd1c61ab81205bb
cups_2.2.10.orig.tar.gz.asc 864 bytes be235dd0cc526e5bde2a67f0dc2888be5d8dc40d1dfa44ab1a322d83f606e82d
cups_2.2.10-6+deb10u5.debian.tar.xz 353.2 KiB ac50140b7135eeaf7fa61ccc2b8be15e9e140009f2e43dc50d241819cd9a21c3

No changes file available.

Binary packages built by this source